Essays about: "modules"
Showing result 11 - 15 of 877 essays containing the word modules.
-
11. Exploring the solar park market in Lower Saxony : Implications on foreign companies’ entry strategies
University essay from Linköpings universitet/Industriell miljöteknikAbstract : To meet the European Union’s target of climate neutrality by 2050 ambitious measures need to be taken. The electricity sector is one of the largest contributors to greenhouse gas emissions globally, which makes it an important sector to decarbonize. For this to happen, fossil fuels must be replaced by renewable energy sources. READ MORE
-
12. Code Synthesis for Heterogeneous Platforms
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Heterogeneous platforms, systems with both general-purpose processors and task-specific hardware, are largely used in industry to increase efficiency, but the heterogeneity also increases the difficulty of design and verification. We often need to wait for the completion of all the modules to know whether the functionality of the design is correct or not, which can cause costly and tedious design iteration cycles. READ MORE
-
13. Biodiversity Monitoring Using Machine Learning for Animal Detection and Tracking
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : As an important indicator of biodiversity and ecological environment in a region, the number and distribution of animals has been given more and more attention by agencies such as nature reserves, wetland parks, and animal protection supervision departments. To protect biodiversity, we need to be able to detect and track the movement of animals to understand which animals are visiting the space. READ MORE
-
14. Antivirus performance in detecting Metasploit payloads : A Case Study on Anti-Virus Effectiveness
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : This paper will focus solely on the effectiveness of AV (antivirus) in detecting Metasploit payloads which have been encapsulated with different encapsulation modules. There seems to be a significant knowledge gap in the evaluation of commercial antivirus's software and their ability to detect malicious code and stop such code from being executed on IT systems. READ MORE
-
15. Development and Implementation Strategies Towards a Comprehensive YANG Model-Based Configuration Data Generation Tool
University essay from KTH/Hälsoinformatik och logistikAbstract : Effective management and operation of modern networks heavily rely on efficient network configuration management and infrastructure. Manual configuration management has been proven inefficient, and there is a need to automatize it. READ MORE